diff options
| author | Sean Christopherson <[email protected]> | 2024-08-02 18:55:09 +0000 |
|---|---|---|
| committer | Sean Christopherson <[email protected]> | 2024-11-01 16:22:34 +0000 |
| commit | 1ded7a57b8050ea92c0ab0253b11a917ae1427ff (patch) | |
| tree | c31cb447649e7026554018a61000440578a78584 /rust/helpers/helpers.c | |
| parent | KVM: x86: Reject userspace attempts to access ARCH_CAPABILITIES w/o support (diff) | |
| download | kernel-1ded7a57b8050ea92c0ab0253b11a917ae1427ff.tar.gz kernel-1ded7a57b8050ea92c0ab0253b11a917ae1427ff.zip | |
KVM: x86: Remove ordering check b/w MSR_PLATFORM_INFO and MISC_FEATURES_ENABLES
Drop KVM's odd restriction that disallows clearing CPUID_FAULT in
MSR_PLATFORM_INFO if CPL>0 CPUID faulting is enabled in
MSR_MISC_FEATURES_ENABLES. KVM generally doesn't require specific
ordering when userspace sets MSRs, and the completely arbitrary order of
MSRs in emulated_msrs_all means that a userspace that uses KVM's list
verbatim could run afoul of the check.
Dropping the restriction obviously means that userspace could stuff a
nonsensical vCPU model, but that's the case all over KVM. KVM typically
restricts userspace MSR writes only when it makes things easier for KVM
and/or userspace.
Link: https://lore.kernel.org/r/[email protected]
Signed-off-by: Sean Christopherson <[email protected]>
Diffstat (limited to 'rust/helpers/helpers.c')
0 files changed, 0 insertions, 0 deletions
